Quick Enquiry About Ethical Hacking
Fill this Form and our Executive will contact you soon !!!
Cryptus Cyber Security PVT. LTD.
Hi,
How can i Help you?
Fill this Form and our Executive will contact you soon !!!
Home CCNA Security
Cryptus Cyber Security is a leading IT Training provider company in India offering CCNA Security training services to candidates in different cities of India. With our CCNA Security course training we not only aim at producing excellent Security professionals, but also anticipate to deliver training excellence through our current & advanced training methodologies. We have vastly experienced and certified trainers for every course along with lab facility.
Our CCNA (Cisco Certified Network Associate) Security Course is a beginner level certification for candidates looking for job opportunities in network security field such as Network Security Specialist, Security Administrator, and Network Security Support Engineer. This certification validates a candidate’s ability of creating a secure network using Cisco Devices also capable of installing, configuring and monitoring several network security devices including identifying possible network security threats, taking apt measures for controlling them instantaneously.
Describe confidentiality, integrity, availability (CIA)
Describe SIEM technology
Identify common security terms
Identify common network security zones
Identify common network attacks
Describe social engineering
Identify malware
Classify the vectors of data loss/exfiltration
Describe key exchange
Describe hash algorithm
Compare and contrast symmetric and asymmetric encryption
Describe digital signatures, certificates, and PKI
Campus area network (CAN)
Enable and verify Cisco IOS IPS operations using SDM.
Cloud, wide area network (WAN)
Data center
Small office/home office (SOHO)
Network security for a virtual environment 2015 Cisco Systems, Inc. This document is Cisco Public.
Compare in-band and out-of band
Configure secure network management
Configure and verify secure access through SNMP v3 using an ACL
Configure and verify security for NTP
Use SCP for file transfer
Describe RADIUS and TACACS+ technologies
Configure administrative access on a Cisco router using TACACS+
Verify connectivity on a Cisco router to a TACACS+ server
Explain the integration of Active Directory with AAA
Describe authentication and authorization using ACS and ISE
Identify the functions 802.1X components
Describe the BYOD architecture framework
Describe the function of mobile device management (MDM)
Describe IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode, transport mode)
Describe hairpinning, split tunneling, always-on, NAT traversal
Implement basic clientless SSL VPN using ASDM
Verify clientless connection
Implement basic AnyConnect SSL VPN using ASDM
Verify AnyConnect connection
Identify endpoint posture assessment
Implement an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
Verify an IPsec site-to-site VPN
Configure multiple privilege levels
Configure Cisco IOS role-based CLI access
Implement Cisco IOS resilient configuration
Implement routing update authentication on OSPF 2015 Cisco Systems, Inc. This document is Cisco Public.
Explain the function of control plane policing
Describe STP attacks
Describe ARP spoofing
Describe MAC spoofing
Describe CAM table (MAC address table) overflows
Describe CDP/LLDP reconnaissance
Describe VLAN hopping
Describe DHCP spoofing
Implement DHCP snooping
Implement Dynamic ARP Inspection
Implement port security
Describe BPDU guard, root guard, loop guard
Verify mitigation procedures
Describe the security implications of a PVLAN
Describe the security implications of a native VLAN
Proxy firewalls
Application firewall
Personal firewall
Operations
Function of the state table
Static
Dynamic
PAT
Policy NAT
Verify NAT operations
Zone to zone
Self zone
Configure ASA access management
Configure security access policies 2015 Cisco Systems, Inc. This document is Cisco Public.
Configure Cisco ASA interface security levels
Configure default Cisco Modular Policy Framework (MPF)
Describe modes of deployment (routed firewall, transparent firewall)
Describe methods of implementing high availability
Describe security contexts
Describe firewall services
Network-based IPS vs. host-based IPS
Modes of deployment (inline, promiscuous - SPAN, tap)
Placement (positioning of the IPS within the network)
False positives, false negatives, true positives, true negatives
Rules/signatures
Detection/signature engines
Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
Blacklist (static and dynamic)
SPAM filtering, anti-malware filtering, DLP, blacklisting, email encryption
Local and cloud-based web proxies
Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
Anti-virus/anti-malware
Personal firewall/HIPS
Hardware/software encryption of local data
Track | Regular Track | Weekend (Sat & Sun) |
---|---|---|
Duration | 40 Hours | 5 Weekends |
Hours | 5 Days, 8 Hours | 20 Days, 2 Hours. |
CCNA Security Exam | In the last of the Course | In the Last of the course |
Cisco- CCNA 210-260 (Cisco Certified Network Associate) . |
U59, 1st Floor, Shakarpur,
(Near: Laxmi nagar Metro Station gate no. 2)
Mother dairy road,New Delhi, INDIA
Our Franchises coming soon: Jaipur     Chandigarh     Lucknow     Patna    
Copyright © 2024, Cryptus Cyber Security Pvt Ltd, All Rights Reserved